Content deleted Content added
Darius Bacon (talk | contribs) mNo edit summary |
Note that the techniques below are ''not'' sufficient to ensure security: see the articles computer security, computer insecurity and secure computing for more information. |
||
Line 1:
Here are some hints on
Many of these techniques also improve general quality of code, because almost any major bug can be potentially used by a [[cracker]]
for a [[Denial of Service]] or other attack.
Note that the techniques below are ''not'' sufficient to ensure security: see the articles [[computer security]], [[computer insecurity]] and [[secure computing]] for more information.
<i>Please expand this article. These random notes should be changed to a more coherent article.</i>
|